Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Careers== Cybersecurity is a fast-growing field of [[Information technology|IT]] concerned with reducing organizations' risk of hack or data breaches.<ref>{{Cite book|last=Bullard|first=Brittany|url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119271260|title=Style and Statistics: The Art of Retail Analytics|date= 2016|publisher=Wiley|isbn=978-1-119-27031-7|language=en|doi=10.1002/9781119271260.ch8}}</ref> According to research from the Enterprise Strategy Group, 46% of organizations say that they have a "problematic shortage" of cybersecurity skills in 2016, up from 28% in 2015.<ref>{{cite web|url=http://www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html|title=Cybersecurity Skills Shortage Impact on Cloud Computing|last=Oltsik|first=Jon|website=Network World|access-date=23 March 2016|archive-url=https://web.archive.org/web/20160323042705/http://www.networkworld.com/article/3045801/security/cybersecurity-skills-shortage-impact-on-cloud-computing.html|archive-date=23 March 2016|date=18 March 2016}}</ref> Commercial, government and non-governmental organizations all employ cybersecurity professionals. The fastest increases in demand for cybersecurity workers are in industries managing increasing volumes of consumer data such as finance, health care, and retail.<ref>{{cite web|last=Robinson|first=Terry|date=2018-05-30|title=Why is a Degree in Cyber Security one of the Best?|url=https://www.degreequery.com/why-is-a-degree-in-cyber-security-one-of-the-best/|access-date=2021-10-10|website=DegreeQuery.com|language=en-US|archive-date=10 October 2021|archive-url=https://web.archive.org/web/20211010052542/https://www.degreequery.com/why-is-a-degree-in-cyber-security-one-of-the-best/}}</ref> However, the use of the term ''cybersecurity'' is more prevalent in government job descriptions.<ref>{{cite web |last=de Silva |first=Richard |title=Government vs. Commerce: The Cyber Security Industry and You (Part One) |url=http://www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ |publisher=Defence IQ |access-date=24 April 2014 |date=11 October 2011 |url-status=live |archive-url=https://web.archive.org/web/20140424200253/http://www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ |archive-date=24 April 2014 }}</ref> Typical cybersecurity job titles and descriptions include:<ref>{{cite web |title=Department of Computer Science |url=http://www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs |access-date=30 April 2013 |archive-url=https://web.archive.org/web/20130603085633/http://www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs |archive-date=3 June 2013 }}</ref> ===Security analyst=== : Analyzes and assesses vulnerabilities in the infrastructure (software, hardware, networks), investigates using available tools and countermeasures to remedy the detected vulnerabilities and recommends solutions and best practices. Analyzes and assesses damage to the data/infrastructure as a result of security incidents, examines available recovery tools and processes, and recommends solutions. Tests for compliance with security policies and procedures. May assist in the creation, implementation, or management of security solutions. ===Security engineer=== : Performs security monitoring, security and data/logs analysis, and forensic analysis, to detect security incidents, and mount the incident response. Investigates and utilizes new technologies and processes to enhance security capabilities and implement improvements. May also review code or perform other [[security engineering]] methodologies. ===Security architect=== : Designs a security system or major components of a security system, and may head a security design team building a new security system.<ref>{{cite web|date=2021-08-01|title=About Cyber Security architect|url=https://www.cisa.gov/security-architect|access-date=2022-01-01|website=cisa.gov}}</ref> ===Chief Information Security Officer (CISO)=== : A high-level management position responsible for the entire information security division/staff. The position may include hands-on technical work.<ref>{{cite web|date=2021-08-01|title=How to become a Chief Information Security Officer (CISO)?|url=https://cybersecuritycareer.org/chief-information-security-officer-ciso/|access-date=2022-01-04|website=cybersecuritycareer.org}}</ref> ===Chief Security Officer (CSO)=== : A high-level management position responsible for the entire security division/staff. A newer position is now deemed needed as security risks grow. ===Data Protection Officer (DPO)=== : A DPO is tasked with monitoring compliance with data protection laws (such as [[GDPR]]), data protection policies, awareness-raising, training, and audits.<ref>{{cite web|url=https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/accountability-and-governance/data-protection-officers/|title=Data Protection Officers |website= ico.org.uk|date=January 2021 }}</ref> ===Security Consultant/Specialist/Intelligence=== : Broad titles that encompass any one or all of the other roles or titles tasked with protecting computers, networks, software, data or information systems against viruses, worms, spyware, malware, intrusion detection, unauthorized access, denial-of-service attacks, and an ever-increasing list of attacks by hackers acting as individuals or as part of organized crime or foreign governments. <!-- PLEASE RESPECT ALPHABETICAL ORDER --> Student programs are also available for people interested in beginning a career in cybersecurity.<ref>{{cite web|title=Student Cybersecurity Resources|url=https://niccs.cisa.gov/formal-education/students-launch-your-cyber-career|url-status=live|archive-url=https://web.archive.org/web/20201105234726/https://niccs.cisa.gov/formal-education/students-launch-your-cyber-career |archive-date=5 November 2020 |publisher=NICCS (US National Initiative for Cybercareers and Studies)}}</ref><ref>{{cite web |url=https://www.dhs.gov/join-dhs-cybersecurity |title=Current Job Opportunities at DHS |publisher=U.S. Department of Homeland Security |access-date=5 May 2013 |url-status=live |archive-url=https://web.archive.org/web/20130502135412/http://www.dhs.gov/join-dhs-cybersecurity |archive-date=2 May 2013 }}</ref> Meanwhile, a flexible and effective option for information security professionals of all experience levels to keep studying is online security training, including webcasts.<ref>{{cite web |url=https://www.dhs.gov/cybersecurity-training-exercises |title=Cybersecurity Training & Exercises |publisher=U.S. Department of Homeland Security |access-date=9 January 2015 |url-status=live |archive-url=https://web.archive.org/web/20150107111146/http://www.dhs.gov/cybersecurity-training-exercises |archive-date=7 January 2015 |date=12 May 2010 }}</ref><ref>{{cite web |title=Cyber Security Awareness Free Training and Webcasts |url=https://msisac.cisecurity.org/resources/videos/free-training.cfm |publisher=MS-ISAC (Multi-State Information Sharing & Analysis Center) |access-date=9 January 2015 |url-status=live |archive-url=https://web.archive.org/web/20150106064140/http://msisac.cisecurity.org/resources/videos/free-training.cfm |archive-date=6 January 2015 }}</ref> A wide range of certified courses are also available.<ref>{{cite web|url=http://iase.disa.mil/iawip/Pages/iabaseline.aspx|title=DoD Approved 8570 Baseline Certifications|website=iase.disa.mil|archive-url=https://web.archive.org/web/20161021073353/http://iase.disa.mil/iawip/Pages/iabaseline.aspx|archive-date=21 October 2016|access-date=19 June 2017}}</ref> In the United Kingdom, a nationwide set of cybersecurity forums, known as the [[UK Cyber Security Forum|U.K Cyber Security Forum]], were established supported by the Government's cybersecurity strategy<ref>{{cite web |url=https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/386093/The_UK_Cyber_Security_Strategy_Report_on_Progress_and_Forward_Plans_-_De___.pdf |title=The UK Cyber Security Strategy: Report on Progress and Forward Plans December 2014 |publisher=United Kingdom Cabinet Office |access-date=20 August 2021 |url-status=live|archive-url=https://web.archive.org/web/20180418230804/https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/386093/The_UK_Cyber_Security_Strategy_Report_on_Progress_and_Forward_Plans_-_De___.pdf |archive-date=18 April 2018 }}</ref> in order to encourage start-ups and innovation and to address the skills gap<ref>{{Cite web|url=https://www.gov.uk/government/news/cyber-skills-for-a-vibrant-and-secure-uk|title=Cyber skills for a vibrant and secure UK|website=GOV.UK}}</ref> identified by the [[Government of the United Kingdom|U.K Government]]. In Singapore, the [[Cyber Security Agency (Singapore)|Cyber Security Agency]] has issued a Singapore Operational Technology (OT) Cybersecurity Competency Framework (OTCCF). The framework defines emerging cybersecurity roles in Operational Technology. The OTCCF was endorsed by the [[Infocomm Media Development Authority]] (IMDA). It outlines the different OT cybersecurity job positions as well as the technical skills and core competencies necessary. It also depicts the many career paths available, including vertical and lateral advancement opportunities.<ref>{{cite press release | title=Singapore Operational Technology (OT) Cybersecurity Competency Framework | website=Cyber Security Agency | date=2021-10-08 | url=https://www.csa.gov.sg/News/Press-Releases/singapore-operational-technology-cybersecurity-competency-framework | archive-url=https://web.archive.org/web/20211016185633/https://www.csa.gov.sg/News/Press-Releases/singapore-operational-technology-cybersecurity-competency-framework | archive-date=16 October 2021 | access-date=23 October 2021 }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)